CN101103406A - Recording medium, apparatus for decrypting data and method thereof - Google Patents

Recording medium, apparatus for decrypting data and method thereof Download PDF

Info

Publication number
CN101103406A
CN101103406A CNA2006800023736A CN200680002373A CN101103406A CN 101103406 A CN101103406 A CN 101103406A CN A2006800023736 A CNA2006800023736 A CN A2006800023736A CN 200680002373 A CN200680002373 A CN 200680002373A CN 101103406 A CN101103406 A CN 101103406A
Authority
CN
China
Prior art keywords
data
key
title
recording medium
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006800023736A
Other languages
Chinese (zh)
Other versions
CN101103406B (en
Inventor
徐康洙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LG Electronics Inc
Original Assignee
LG Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LG Electronics Inc filed Critical LG Electronics Inc
Priority claimed from PCT/KR2006/000031 external-priority patent/WO2006078100A2/en
Publication of CN101103406A publication Critical patent/CN101103406A/en
Application granted granted Critical
Publication of CN101103406B publication Critical patent/CN101103406B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00224Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/0042Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard
    • G11B20/00427Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the copy protection scheme being related to a specific access protection standard advanced access content system [AACS]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00528Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/102Programmed access in sequence to addressed parts of tracks of operating record carriers
    • G11B27/105Programmed access in sequence to addressed parts of tracks of operating record carriers of operating discs
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/11Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information not detectable on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/10Indexing; Addressing; Timing or synchronising; Measuring tape travel
    • G11B27/19Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier
    • G11B27/28Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
    • G11B27/32Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording on separate auxiliary tracks of the same or an auxiliary record carrier
    • G11B27/327Table of contents
    • G11B27/329Table of contents on a disc [VTOC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/87Regeneration of colour television signals
    • H04N9/8715Regeneration of colour television signals involving the mixing of the reproduced video signal with a non-recorded signal, e.g. a text signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2537Optical discs
    • G11B2220/2541Blu-ray discs; Blue laser DVR discs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/80Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N9/804Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
    • H04N9/8042Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components involving data reduction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/80Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N9/804Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components
    • H04N9/806Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components with processing of the sound signal
    • H04N9/8063Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback involving pulse code modulation of the colour picture signal components with processing of the sound signal using time division multiplex of the PCM audio and PCM video signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/80Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N9/82Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only
    • H04N9/8205Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only involving the multiplexing of an additional signal and the colour video signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/79Processing of colour television signals in connection with recording
    • H04N9/80Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N9/82Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only
    • H04N9/8205Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only involving the multiplexing of an additional signal and the colour video signal
    • H04N9/8227Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback the individual colour picture signal components being recorded simultaneously only involving the multiplexing of an additional signal and the colour video signal the additional signal being at least another television signal

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Television Signal Processing For Recording (AREA)
  • Management Or Editing Of Information On Record Carriers (AREA)

Abstract

A method of transmitting encrypted data, recording medium including the encrypted data, apparatus for reproducing the same using a local storage and method thereof are disclosed. The present invention includes downloading a data associated with the recording medium to the local storage, constructing a virtual package by binding the downloaded data to a disc package within the recording medium, decrypting an indexing item of an index table within the virtual package using a key within a key file associated with the recording medium, and reproducing the decrypted indexing item, wherein information for solving a mismatch that occurs between the indexing item of the index table and an indexing item of the key file is included in the virtual package. By the present invention, the data associated with the recording medium is downloaded from outside to the local storage while contents provided by a content provider are protected. And, both of the data within the recording medium and the data within the local storage can be efficiently reproduced using a virtual package. Therefore, the present invention can provide more convenient functions to a user.

Description

Recording medium, be used for the devices and methods therefor of data decryption
Technical field
The present invention relates to the playback of recording medium, relate in particular to recording medium, be used for the device and the method thereof of data decryption.
Background technology
Generally speaking, the CD that can write down large data is widely used as recording medium.Recently, for example the novel high-density recording medium of Blu-ray disc (below be abbreviated as BD) has been developed and has been used for the storage duration video data of long high image quality and the voice data of high sound quality.
BD as recording medium technology of future generation has the optical recording scheme of future generation that significantly surpasses the data of conventional DVD.And, many effort have been made in the research and development of BD and other digital device.
Begin to develop and have the optical recording/reproducing apparatus that blu-ray disc specification is used.Yet because the imperfection of blu-ray disc specification, the exploitation fully of optical recording/reproducing apparatus has many difficulties.
Particularly, this optical recording/reproducing apparatus need be provided with record and reproduce the basic function of Blu-ray disc (BD) and consider additional function with the polymerization of peripheral digital devices.Therefore, wish that this optical recording/reproducing apparatus should be provided with reception with general utility functions that show external input signal and the function of reproducing BD and external input signal.Yet, when reproducing external input signal and BD, owing to also not have to propose and exploitation is used to protect the method for optimizing of the shared data that is provided by content provider, so the exploitation based on the optical recording/reproducing apparatus of complete BD is provided with many restrictions.
Summary of the invention
Therefore, the present invention is directed to and avoided substantially because the limitation of correlation technique and the recording medium of the caused one or more problems of shortcoming, the devices and methods therefor of data decryption.
An object of the present invention is to provide recording medium, be used for the devices and methods therefor of data decryption; wherein be provided with this locality storage that to store from data this recording medium outside, that be associated with this recording medium, and can use this this locality storage and recording medium protection content by it.
Other advantage of the present invention, purpose and characteristic ground will be set forth in the following description, and partly will become apparent after those of ordinary skills read following content in detail, or can know from the practice of the present invention.Purpose of the present invention and other advantage can realize by the structure that particularly points out in accompanying drawing and written explanation and claim thereof and reach.
In order to realize these purposes and other advantage and, as embodying at this and broadly describe, may further comprise the steps according to the method for data decryption of the present invention: will download to local the storage with the recording medium associated encrypted data according to purposes of the present invention; The interior first kind key of key file that use is stored in the recording medium is deciphered the data that are recorded in the recording medium; And use the second class key be stored in the key file in the recording medium or be stored in one of key file in the local storage to decipher institute's data downloaded.
For example, the second class key is identical with first kind key.
For example, the second class key and first kind key separate storage.
For example, be stored in key file and the key file separate storage that is stored in the recording medium in the local storage.
For example, the key file that is stored in the local storage comprises the key of being downloaded.
For example, the key file that is stored in the local storage reads from recording medium to deposit local storage in.
For example, the key file that is stored in the local storage is placed in the place of safety that is built up in the local storage.
For example, institute's data downloaded be be recorded in recording medium in the situation of the subpath data that are associated of main path in, use the same key of main path data to decipher this subpath data.
In another aspect of this invention, the method for data decryption may further comprise the steps: will download to local storage with the data of the use secret key encryption that is associated with recording medium; Use the link information between these data and the decruption key to read decruption key; And use this decruption key to decipher this data.
For example, this link information is included in the database file of data download.
For example, this link information is stored in the local storage as link information file.
For example, this link information file is stored in the place of safety in the local storage.
For example, this link information file is stored in the AV data recorded area in the local storage.
For example, this link information is ' CPS_unit_number '.
For example, this decruption key defines with reference to ' CPS_unit_number '.
For example, ' CPS_unit_number ' distributes by each title ground.
In another aspect of this invention, recording medium comprises the database community that wherein writes down substantial stream district and be used to manage these reproduction of content, wherein a plurality of titles with secret key encryption are included in the stream district, and completely or partially share each other in the situation of a montage at a plurality of titles, share a plurality of titles of this montage and encrypt with same key.
For example, comprise in the situation of main path and subpath that each in this main path and the subpath is all used identical secret key encryption at title with secret key encryption.
For example, in all or part of shared recording medium of the title of being downloaded, in the situation of the montage of configuration encrypted title, share the title of this montage in the recording medium and encrypt with identical key.
In still another aspect of the invention, the device that is used for data decryption comprises: pick-up is used for the data of reading and recording at recording medium; Local storage, be used to store downloaded with the recording medium associated encrypted data; And controller, be used for using the first kind secret key decryption in the key file that is stored in recording medium to be recorded in data in the recording medium, and use and be stored in the key file in the recording medium or be stored in the second class secret key decryption institute data downloaded in one of key file in the local storage.
For example, the second class key is identical with first kind key.
For example, the second class key and first kind key separate storage.
For example, be stored in key file and the key file separate storage that is stored in the recording medium in the local storage.
For example, the key file that is stored in the local storage is placed into the place of safety that is built up in the local storage.
For example, institute's data downloaded be be recorded in recording medium in the situation of the subpath data that are associated of main path in, this controller uses the same key of main path data to decipher this subpath data.
In another aspect of the present invention, the device that is used for data decryption comprises: pick-up is used for the data of reading and recording at recording medium; Local storage, be used to store downloaded with the recording medium associated encrypted data; And controller, be used to use the link information between data download and the decruption key to read decruption key, this controller uses this decruption key deciphering institute data downloaded.
For example, this link information is included in the database file of data download.
For example, this link information is stored in the local storage as link information file.
For example, this link information file is stored in the place of safety in the local storage.
For example, this link information file is stored in the AV data recorded area in the local storage.
For example, this link information is CPS_unit_number.
By the present invention, content can be provided safely and reproduce data efficiently.Therefore, the present invention can provide more convenient function to the user.
It should be understood that above general introduction of the present invention and following detailed description all are exemplary and explanat, aim to provide further specifying the present invention for required protection.
Description of drawings
To provide the present invention is further understood in being included in, and be incorporated among the application and constitute its a part of accompanying drawing and show each embodiment of the present invention, and together play the effect of explaining the principle of the invention with instructions.In the accompanying drawings:
Fig. 1 is the diagrammatic sketch of being convenient to concept nature understanding of the present invention;
Fig. 2 is the diagrammatic sketch that is recorded in as file structure in the CD of recording medium and the relation when using this document structure reproduction one specific title according to of the present invention;
Fig. 3 is the diagrammatic sketch that writes as the data recording structure on the CD of recording medium according to of the present invention;
Fig. 4 is the block diagram according to optical recording/reproducing apparatus of the present invention;
Fig. 5 is convenient to the diagrammatic sketch understood according to the concept nature of the encrypt/decrypt of data of the present invention;
Fig. 6 is the diagrammatic sketch that is used to illustrate according to the data decryption method of first embodiment of the invention;
Fig. 7 is the diagrammatic sketch that is used to illustrate according to the data decryption method of second embodiment of the invention;
Fig. 8 A is the diagrammatic sketch that is used to illustrate according to the data decryption method of third embodiment of the invention;
Fig. 8 B is the diagrammatic sketch that is used to illustrate according to the data decryption method of fourth embodiment of the invention;
Fig. 9 A is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of fifth embodiment of the invention;
Fig. 9 B is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of sixth embodiment of the invention;
Fig. 9 C is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of seventh embodiment of the invention;
Figure 10 is the process flow diagram according to data decryption method of the present invention;
Figure 11 is used for illustrating that the present invention reproduces the diagrammatic sketch of the situation that data are shared;
Figure 12 is the diagrammatic sketch that is used for illustrating the situation that title of the present invention disposes with main path and subpath.
Embodiment
Now will be specifically with reference to its example the preferred embodiments of the present invention illustrated in the accompanying drawings.In the case of any possible, will run through institute's drawings attached uses same numeral to represent identical or similar portions.
At first, for ease of explanation, the present invention is with CD, especially " Blu-ray disc (BD) " as an example of recording medium.Yet, it is evident that technological thought of the present invention is equally applicable to other recording medium.
In the present invention, " local storage " is arranged on the class memory storage in the optical recording/reproducing apparatus shown in Fig. 1, and is meant that the user can store the necessary information that will utilize and the element of data therein at random.Especially, this locality of current general use storage comprises " hard disk ", " system storage " that do not limit the scope of the invention, " flash memory " etc.Particularly, " the local storage " is used as the device of storing the data that are associated with recording medium (for example, Blu-ray disc).The data that are associated with recording medium that are stored in the local storage generally comprise from outside data downloaded.
In addition, it is evident that the system data of permission data that part is directly read from recording medium or the generation that is associated with the recoding/reproduction of recording medium (for example, metadata etc.) can be stored in the local storage.The present invention for convenience of explanation, the data that are recorded in the recording medium will be named as " raw data ", will be named as " additional data " and be stored in the data that are associated with recording medium in the interior data of local storage.
In the present invention, " title " is the reproduction units of configuration and user's interface.Each title all is linked to a specific object.And the stream that is associated with corresponding title that is recorded in the dish reproduces according to order in this object or program.Especially, the present invention for convenience of explanation, the title with moving frame, film and interactive information of compressing according to MPEG2 that is recorded in the title in the dish will be named as " HDMV title ".And the title with moving frame, film and interactive information of being carried out by java applet that is recorded in the title in the dish will be named as " BD-J title ".
Fig. 1 is the diagrammatic sketch of understanding for the ease of concept nature of the present invention, wherein exemplarily shows the use of uniting between optical recording/reproducing apparatus 10 and the peripherals.
With reference to Fig. 1, " optical recording/reproducing apparatus " 10 according to the present invention makes that CD can be according to common-use size record or playback.And the CD that optical recording/reproducing apparatus 10 can be designed to the recoding/reproduction specific standard (for example, BD).In addition, optical recording/reproducing apparatus 10 can be used to only play CD.In the following description of this invention,, BD player or BD register are considered as an example by considering the interactivity between Blu-ray disc (BD) and the peripherals.And, it is evident that " optical recording/reproducing apparatus " 10 comprises " driver " that can be carried within computing machine etc.
Optical recording/reproducing apparatus 10 according to the present invention is equipped with the function of recording/reproducing optical disk 30, and receives external input signal, carries out signal Processing and transmit the ability of respective image by another external display 20 to the user to the received signal.In this case, without limits to external input signal.And DMB (DMB) signal, the Internet signal etc. can be the representative signal of external input signal.In the situation as the easy the Internet of access medium, the particular data on the Internet can be downloaded for utilization by optical recording/reproducing apparatus 10.
In addition, provide content generally to be named as " content provider (CP) " as a side of external source.
In the present invention, the data that provided by the recording medium author are provided the content of configuration title.
Particularly, the objective of the invention is in the encrypted situation of the additional data that is associated with raw data, to use the secret key decryption enciphered data.With reference to Fig. 5 the encryption and decryption of using key are described after a while.
Raw data and additional data will specify as follows.For example, if the multiplexed AV stream of a specific title is recorded in the CD as raw data, if and with the audio stream of this raw data (for example, the Korean) different audio stream (for example, English) be provided on the Internet as additional data, then will exist (for example downloading on the Internet as the audio stream of additional data according to the user, English) with the request of reproducing and to downloading on the Internet as the request of the audio stream (for example, English) of additional data with independent reproduction with the AV of this raw data stream.In order to allow these requests, need to adjust related between raw data and the additional data and need be according to the systems approach of user's request management/reproduction data.
In more than describing for the ease of explaining, be recorded in signal in the dish and be named as raw data and be present in the outer signal of dish and be named as additional data, this identifies but restriction is not set and raw data or additional data will be restricted to particular data according to the method for obtaining every kind of data.
Therefore, additional data generally comprises its hard-core audio frequency, Presentation Graphics (PG), interactive graphics (IG) (IG), text subtitle etc.And additional data can flow corresponding with comprising all multiplexed AV that data and video are shown.That is, be present in the outside and data with any kind of attribute that be associated with raw data of CD and can become additional data.
In addition, additional data can by index file (index), play list file ( *.m2ts) or clip information file ( *.clpi) download individually.In addition, additional data can be downloaded according to content element or according to header cell.
In order to realize that the user asks, it is necessary that the file structure between raw data and the additional data is provided.The file and the data recording structure that can be used for Blu-ray disc (BD) specify as follows with reference to Fig. 2 and Fig. 3.
Fig. 2 is the diagrammatic sketch that is recorded in as file structure in the CD of recording medium and the relation when using this document structure reproduction specific title according to of the present invention.
With reference to Fig. 2, in file structure according to the present invention, under a root directory, there are AACS catalogue and at least one BDMV catalogue.As guaranteeing that index file (" index ") and obj ect file (" MovieObject ") with the general file (topmost paper) of user's interactivity are present in the BDMV catalogue.And, have the information of the data of physical record in dish and be provided with PLAYLIST catalogue, CLIPINF catalogue, STREAM catalogue, AUXDATA catalogue, BDJO catalogue, META catalogue and BACKUP catalogue about the BDMV catalogue of the information of the method for reproducing recorded data.Each catalogue and the file that is included in each catalogue will specify as follows.
The META catalogue comprises the meta data file of conduct about the data of data.That is, in the META catalogue, there are the search file, meta data file of make an inventory of goods in a warehouse (Disc Library) etc.
The BDJO catalogue comprises the BD-J obj ect file that is used to reproduce the BD-J title.
The AUXDATA catalogue comprises the secondary file that contains dish playback information needed.For example, the AUXDATA catalogue can be included in audio files (" Sound.bdmv ") that click sound is provided in the situation of carrying out interactive graphics (IG) and the font file (" 1111.otf ") that font information is provided in the situation of dish playback.
In the STREAM catalogue, exist with specific format to be recorded in AV stream file in the dish, each stream generally is registered as the MPEG-2 transmission package, and " .m2ts " be used as stream file extension name (01000.m2ts ...).Especially, the stream that is generated together by multiplex video, video and image information is named as A/V stream, and at least one or a plurality of A/V stream file constitute a title.
The CLIPINF catalogue comprises with stream file distinguishes clip information file (01000.clpi, 02000.clpi) one to one.Especially, clip information file (" *.clpi ") comprise the attribute information and the timing information of respective streams file.Especially, stream file (" *.m2ts ") and with stream file (" *.m2ts ") one to one clip information file (" *.clpi ") be bundled in called after " montage " together.That is, " montage " be comprise stream file (" *.m2ts ") with clip information file (" *.clpi ") both data.
The PLAYLIST catalogue comprise play list file (" *00000.mpls ").Each play list file (" *00000.mpls ") comprise and specify broadcast at least one broadcast item and the son at interval that reproduces a specific clips to play item (SPI).Playing item has about the reproduction zero-time (IN-Time) of a specific clips and the information of reproduction end time (OUT-Time) with son broadcast (SPI).
Be called as " main path " according at least one reproduction process of playing (PI) in the play list file, and the reproduction process according at least one height broadcast (SPI) is called as " subpath " in the play list file.Main path should be present in the play list file, and can whether have at least one subpath as required according to the existence of son broadcast (SPI).
That is, play list file becomes the basic reproduction management document unit in the whole reproduction management file structure, and the reproduction of a specific clips is carried out in this unit by the one or more at least broadcast items of combination.
The BACKUP directory stores be used in log file structured data and the information index file (" index ") that is associated of dish playback, obj ect file (MoiveObject, BD-J object), the PLAYLIST catalogue all play list file (" *.mpls ") and the CLIPINF catalogue in all clip information file (" *.clpi ") whole copied files.Playback is fatal because the disappearance of these files is to dish, so these files of BACKUP directory stores are used for backup.
In the AACS catalogue, there is unit key file.And the enciphered message with the data of secret key encryption is present in this unit key file.
Another diagrammatic sketch of Fig. 2 shows the relation of being reproduced a specific title by above-mentioned Pan Bao.
If the user's who provides by the index file that is also referred to as concordance list the title reproduction command to title has been provided, then will begin the reproduction of corresponding title, this specifies as follows.
At first, configuration has " at first playing " information of the information relevant with the image that at first reproduces, " top menu " information that menu image is provided and at least one " title (title #1~title #n) " information in the situation that loads respective disc in concordance list (index.bdmv).
In case in optical recording/reproducing apparatus 10, loaded CD 30, then provide title menu information to the user according to concordance list by display 20.If the user has selected a specific title or a certain menu in this menu image, then begin to reproduce according to the file structure that defines by the dish author in advance.That is, (for example, title #1) reproduction order is then carried out corresponding play list file according to the order or the program that provide in the obj ect file of reproducing on the management file structure (MovieObject, BD-J object) to a specific title if provided.Play and/or son is play at least one or an a plurality of montage (for example, montage #1~montage #3) of reproducing configuration title #1 by specific according to playlist file information then.
In the encrypted situation of " at first play ", " top menu " or " title ", need data that deciphering reproduced by " at first playing ", " top menu " or " title " to reproduce being used for.If provided the reproduction order to one of " at first playing ", " top menu " and " title ", then the key corresponding to unit key file in the AACS catalogue is read out.And, use the key of reading to come data decryption.These decrypted data are reproduced then.
Fig. 3 is the diagrammatic sketch that writes as the data recording structure on the CD of recording medium according to of the present invention.
With reference to Fig. 3, from the inner circumference of dish, exist as the file system information area of the system information of the whole file of management, wherein with playlist and clip information file with the AV stream of reproducing recorded ( *.m2ts) district (" database community ") and having write down disposes the AV stream district of the stream of audio/video/graphic etc.As mentioning in the above description, the data that are recorded in AV stream district in the present invention are named as raw data.
Be recorded in the raw data (for example, the file structure shown in Fig. 2) in coiling and be stored in the encrypted situation of the interior additional data of local storage, the present invention aims to provide the apparatus and method that are used for decrypt encrypted data.
Fig. 4 A is the block diagram of optical recording/reproducing apparatus 10 according to an embodiment of the invention.
With reference to Fig. 4 A, optical recording/reproducing apparatus 10 according to an embodiment of the invention comprises substantially: pick-up 11 is used for reproducing and comprises the raw data that is recorded in CD and reproduce management document management of information information; Servo control mechanism 14 is used to control the action of pick-up 11; Signal processor 13, the reproducing signal that is used for receiving from pick-up 11 reverts to a signal specific value, and the signal that this signal processor 13 will write down is modulated to and can be recorded in the signal on the CD and sends this through modulation signal; And microprocessor 16, be used to control all operations.
The additional data that is present in the place except that CD is downloaded to controller 12 by user command etc.And controller 12 can be stored in the local storage 15 institute's data download.In the encrypted situation of raw data and/or additional data, controller 12 these enciphered datas of deciphering are also reproduced decrypted data according to user's request subsequently.
And A/V demoder 17 finally also offers the user with this decoded data subsequently according to the control decoding output data (raw data and/or additional data) of controller 12.In addition, in order to carry out the function of signal record in CD, AV scrambler 18 is converted to for example signal of the specific format of MPEG2 transport stream according to the control of controller 12 with input signal, and the signal after will changing subsequently offers signal processor 13.
Fig. 5 is convenient to the diagrammatic sketch understood according to the concept nature of the encrypt/decrypt of data of the present invention.
With reference to Fig. 5, at first, the encryption of following explanation data.Encryption be with the mode of using the special algorithm transform data prevent that the illegal copies of content that content provider (CP) is provided from selling again, a kind of content protecting method of editor etc.Therefore, the effect of a kind of lock of visit without approval that prevents data is played in the encryption of data, and this special algorithm plays the effect of the key of lock.Therefore, the special algorithm that is used for this data encryption is called as encryption key.
Should be provided for decipher and encrypt the device of used special algorithm to reproduce this enciphered data.This special algorithm decipher device plays a kind of effect of key of lock.If this key is provided, then uses this key to come the used algorithm of interpret data deciphering and these data are reverted to its unprocessed form.Such data recover to be called as deciphering.
In the present invention, the used algorithm of the encryption and decryption of data is called as key.Data encryption can be by carrying out such as the scheduled unit of content element, header cell etc.And the key that uses by the scheduled unit enciphered data time will be named as " unit key ".
In the present invention, " CPS (content protective system) unit " is meant " at first playing ", " top menu " and/or " title " group of using identical " unit key " to encrypt.And each " CPS unit " all has " CPS_unit_number ".
For example, all AV stream files that reproduced by " at first playing " use identical " unit key " that is included in this identical " CPS unit ".All AV streams that reproduced by " top menu " use identical " unit key " that be included in this identical " CPS unit " to encrypt.And, use identical with this " CPS unit " corresponding identical " unit key " to encrypt by all AV stream files of a title reproduction.
Especially, in Fig. 5, title #1, title #2 and title #3 are recorded in as in the BD-ROM of the recording medium dish.And the title #4 that downloads from the outside of this recording medium is present in the local storage.The data that dispose these titles (title #1 is to #4) are enciphered datas, and are present in this dish as unit key file about the information of the used key of data encryption.This unit key file can be present in the outside of this dish.Yet this unit key file preferably is present in the dish, to prevent waiting the leakage of information that causes because of the hacker.
Select to reproduce in the situation that is recorded in the title #3 in the dish the user, used key (hereinafter referred to as decruption key) should be provided for content decryption module to reproduce title #3 when deciphering title #3.
In case the decruption key of title #3 is provided, then content decryption module uses the key that is provided that title #3 deciphering is the data layout before encrypting.So, reproduced by demoder 17 through decrypted data.
Comprise that the title of data download is represented as title #4 in the local storage among Fig. 5, and be provided for the user subsequently.If the user provides the reproduction order of title #4, then the decruption key of title #4 is read from unit key file.This decruption key of reading is provided for content decryption module with deciphering title #4 with title #4.
Fig. 6 shows method according to the use secret key decryption data of various embodiments of the present invention respectively to 8B.
Fig. 6 or Fig. 7 illustrate the method that is present in the secret key decryption data download in the dish of using.In Fig. 6, the decruption key of data download is that deciphering is recorded in the used key of data in the dish.In Fig. 7, the decruption key of data download is stored in the dish individually to be used for data download.Fig. 8 A or Fig. 8 B illustrate the method for using the secret key decryption data in the unit key file that is stored in the local storage.In Fig. 8 A, data download is only used the key in the unit key file of inserting in the local storage.In Fig. 8 B, be recorded in the key that the data in the dish use the unit key file from insert local storage to read.
Fig. 6 is the diagrammatic sketch that is used to illustrate according to the method for first embodiment of the present invention data decryption, and wherein data download uses the key that is recorded in the data in the dish that is used to decipher that is stored in the dish to decipher.That is, data download and the data sharing decruption key that is recorded in the dish.
With reference to Fig. 6, concordance list 610 and unit key file 620 are present in the dish.Be present in concordance list 610 in the dish dispose " at first play ", " top menu " and " title (title #1, title #2 ...) ".
In the unit key file in dish, stored about the index entry that comprises in the configuration index table (that is, " at first broadcast ", " top menu " and " title (title #1, title #2 ...) ") the information of decruption key of data.Hereinafter, the decruption key of the data of configuration title #n is represented as " key of title #n ".That is, " key of title #1 " 620a is the key that provides for the title #1 in coiling, and " key of title #2 " 620b is the key that provides for the title #2 in coiling.
Enciphered data can be downloaded to local storage from the outside of dish.The new concordance list 630 that can reproduce data download is provided for the user.Title #1630a in the concordance list 630 is corresponding to title #1 (title on the dish) 610a in the dish, title #2 630c is corresponding to the title that comprises data download (hereinafter referred to as downloaded title), and title #3 630b is corresponding to title #2 (title on the dish) 610b in the dish.
Dispose in the situation of enciphered data at downloaded title #2 630c, this enciphered data should be decrypted to reproduce this title #2.
Fig. 6 shows the decruption key that is used for data download and is present in the interior situation of dish, and wherein this key is corresponding to the decruption key that is used for also being present in other data in this dish.That is, the title #2 630c in the new concordance list can decipher with " key of title 1 " 620a.In this case, " key of title #1 " 620a is the decruption key (610a=630a) that is used to be recorded in the title #1 in this dish.
Content supply can be with data encryption, and these data should be used and wait and decipher being recorded in decruption key 620a, the 620b of data in the dish, then enciphered data are offered the user.By downloading in the situation that receives this enciphered data, player reads the decruption key that is used for data download from dish the user, deciphers data download with the decruption key of reading, and reproduces institute's decrypted data then.
Fig. 7 is the diagrammatic sketch that is used to illustrate according to the data decryption method of second embodiment of the invention, and wherein data download uses the key of storing separately in dish that is used for data download to decipher.That is, the decruption key that is recorded in the data in the dish is not used in the deciphering data download.
With reference to Fig. 7, be recorded in the new table that concordance list and being used in the dish reproduces data download and be equivalent to the concordance list 610 and 630 shown in Fig. 6 respectively.Yet, in the embodiment shown in fig. 7, the key 722 that is used for data download be recorded in dish in be used to that to be recorded in the key 721 of the data in the dish different, be stored in the dish individually.In the situation of having downloaded enciphered data, this enciphered data is deciphered with one of key 722 of storing separately.
That is (630a=610a, 630b=610b) decruption key 721 of service recorder in dish deciphered respectively, to be recorded in the interior title of dish.And downloaded title 630c uses the deciphering of one of key that is used for data download 722 of separate storage.
Especially, in case provided the reproduction order of the title #1 630a of new concordance list 630, " key of the title #1 " 721a that is used for being recorded in the decruption key 721 of the title in the dish is provided for content decryption module with title #1.In content decryption module, title #1 is by " key of title #1 " 721a deciphering.And, be one of decruption key 721 that also is recorded in the title in the dish as " key of title #2 " 721b of the decruption key of title #3 630b.
The author of dish can store spare key to take data download into account in dish.And, thereby the user can come enciphered data that enciphered data can be deciphered with one of these keys with corresponding key, then this enciphered data is offered the user.That is, the title #2 630c in the new concordance list 630 is encrypted as and will deciphers with one of spare key that is used for data download 722 of being stored (key of title #n) 722a, and enciphered data is provided for the user then.In case the user provides the reproduction order of title #2 630c, player just reads " key of title #n " in the key 722 for the data download storage, uses the secret key decryption title #2 that is read then.
Fig. 8 A is the diagrammatic sketch that is used to illustrate according to the data decryption method of third embodiment of the invention, and wherein the key that separates with the key that is stored in the dish is stored in the local storage, and data download uses the key that is stored in the local storage to decipher.That is, in dish and local storage, there are two unit key file that are associated with dish respectively.
Decruption key preferably is present in the dish to prevent waiting the leakage of information that causes because of the hacker.Yet, can in this locality storage, set up the place of safety that user without approval can not visit, thereby key can be stored in this place of safety.
In the present invention, unit key file 820 is stored in the local storage, and another unit key file 620 is stored in the dish.That is, at dish with store and have a unit key file in both each.The unit key file that is stored in the local storage can maybe can read from dish from the outside download of dish.
In addition, when data decryption, be stored in that data in the dish can be used the secret key decryption that is stored in the dish and data download can be used the secret key decryption that is stored in the local storage.
In case provided the reproduction order of title #1 in the new concordance list 630 or title #2, then read key in the key 620 of player in being stored in dish corresponding to each title, then the key of being read is offered content decryption module.Especially, read and be used for title #1 the key 620 of " key of title #1 " 620a in being stored in dish, and " key of title #2 " 620b is read out and is used for title #3.
On the other hand, in case provide the reproduction order of title #2, in the process of deciphering title #2, just can read corresponding key 820a from unit key file 820 in being stored in local storage rather than the unit key file 620 the dish.
Fig. 8 B is the diagrammatic sketch that is used to illustrate according to the data decryption method of fourth embodiment of the invention, wherein unit key file is present in the local storage, and is recorded in the interior secret key decryption of unit key file of coiling in interior data and the local storage of data download use.
Be similar to Fig. 8 A, Fig. 8 B illustrates the key file in dish, and unit key file is stored in the local storage.In Fig. 8 A, the key that is stored in the local storage only is used to decipher data download.Yet, in Fig. 8 B, be stored in key in the local storage and be used to decipher data download and deciphering and be recorded in data in the dish.
That is, the decruption key of title #1, title #2 and title #3 is not that unit key file 620 from dish but unit key file 830 from this locality storage are read.Use " key of title #n " in the local storage to carry out as the deciphering of the title #2 630c of downloaded title.And, use " key of title #1 " 831a and " key of title #2 " 831b in the local storage to carry out respectively as the deciphering of title #1 630a that is recorded in the title in the dish and title #3 630b.
The unit key file 830 that is stored in the local storage can comprise the download key, maybe can read to be stored in the local storage from dish.Randomly, as what mentioned in the description of above Fig. 8 A, the place of safety is set up in the storage of this locality and corresponding key can be stored in this place of safety.
Perhaps, decipher in the situation that is recorded in the data in the dish at the key that uses the key be stored in separately in the local storage rather than use to be stored in the dish, be used for deciphering be recorded in the data in the dish key only from be stored in key in coiling when reading ability licensed.For example, a unit key file disposes and is recorded in interior (all) keys of dish and (all) keys of download, is stored in then in the local storage.In case provide the reproduction of data, just can read required key from the unit key file being stored in local storage.
Simultaneously, Fig. 8 B shows the example of key 831 separate storage in the storage of this locality of key 832 with title 630a and the 630b of downloaded title 630c.Because the used key of data that is stored in the dish among Fig. 6 can be used for data download, therefore it is evident that need not to identify to be provided for to be recorded in the data in the dish or to be provided for downloaded title with regard to storage key.
In the present invention, can decipher corresponding data, the content of content provider can be provided safely by making the user who only holds with the corresponding key of data encryption.That is, receive in the situation of data download user without approval, it is evident that this without approval the user can't hold corresponding secret key.So the user can not reproduce corresponding data without approval.Therefore, recording medium can be protected with the content that downloads to local storage.
In addition, if in the encrypted situation of data and exist can data decryption a plurality of keys, need to select be suitable for deciphering the key of this enciphered data.So, the invention provides use and can activate the method and apparatus that the link information of the selection of the key that is suitable for decrypt encrypted data is come data decryption.
Fig. 9 A shows the method for using the link information data decryption according to various embodiments of the present invention respectively to 9C.
In the following description, for example, the data of a title of configuration use identical " unit key " to encrypt and " CPS_unit_number " is used as link information.As mentioning in the above description, be that unit provides " unit key " ciphered data group that " CPS_unit_number " and " CPS unit " is meant that use is identical with " CPS unit ".
The link information that Fig. 9 A and Fig. 9 B show data download is stored in such as the situation in the database files such as concordance list.And Fig. 9 C shows the link information of data download and is stored in the link information that coils interior data and is provided for local storage as independent file.
Database file is the management document that is associated with the reproduction of data.And database file comprises index file, play list file, clip information file etc.In the following description, link information is provided for the concordance list in the database file for example.Yet, it is evident that the present invention is not limited to following examples.
Fig. 9 A is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of fifth embodiment of the invention, and the link information and this key that wherein exist indication can decipher the key of data download are used to decipher the data that are recorded in the dish.That is, in Fig. 9 A, decruption key, the 910a and the 910b that for example are recorded in the data in the dish are recorded in the unit key file 910, and the not independent record of the key of downloaded title.
Unit key file 910 comprises which " CPS unit " is the data that indication is recorded in the dish be included in and the information of being somebody's turn to do " unit key " of " CPS unit ".In the following description, the information of indicating enciphered data to be included in which CPS unit is represented as CPS_unit_number.In the embodiment shown in Fig. 9 A, the data of a title of configuration are encrypted with identical " unit key " and can be authorized " CPS_unit_number " to each title.
In addition, " CPS_unit_number " given and each title individually.And, need not to distribute different " CPS_unit_number " to each title.In other words, a plurality of titles can have identical " CPS_unit_number " or each title can have different " CPS_unit_number " separately.
And " unit key " that be recorded in the unit key file preferably defines at each " CPS unit ".So, in the present invention,, then mean with the difference " unit key " that is included in different " CPS unit " and come enciphered data if " CPS_unit_number " differs from one another.If " CPS_unit_number " is mutually the same, then come enciphered data with identical " unit key " that be included in identical " CPS unit ".
The title #1 630a of concordance list 630 is corresponding to the title #1 in the title that is recorded in the dish, and title #3630b is corresponding to the title #2 in the title that is recorded in the dish.That is, if title #3 630b is reproduced, the title #2 that then is recorded in the dish is reproduced.The title #2 630c of concordance list is a download title.This concordance list newly is configured to can reproduce downloaded title.This concordance list can be provided individually or can newly be made up by player by content provider.
Therefore, " CPS_unit_number of title #1 " becomes the link information of the title #1 630a of concordance list 630, and " CPS_unit_number of title #2 " becomes the link information of the title #3 630b of concordance list 630.
In case provide the reproduction order to the title #1 630a of concordance list 630, player is seen " the CPS unit " comprising title #1630a by confirming " CPS_unit_number of title #1 " from the unit key file 910 of being stored in the dish.In Fig. 9 A, title #1 is included in " CPS unit #1 ".Be included in " CPS unit #1 " if confirm title #1, then " unit key of CPS unit #1 " 910a is read out with deciphering title #1.In the situation of the title #3 of concordance list 630b, title #3 is the same title that is recorded in the title #2 in the dish.Therefore, can confirm that title #3 630b is included in " CPS unit #2 " according to " CPS_unit_number of title #2 ".Because the key that needs equally to decipher title #2 reproduces the title #2 630c of concordance list 630, so should select suitable key from unit key file.The invention is characterized in and be provided for data are linked to the link information of the required key of these data of deciphering to read the key that is suitable for deciphering institute's data download.In this case, link information can be provided for database file.
For example, if title #2 630c is included in " CPS unit #1 ", if for example the decruption key of title #2 630c is " unit key of CPS unit #1 ", then the link information of title #2 " CPS_unit_number=1 " can be placed in the concordance list that comprises title #2.In this case, in case provide the reproduction order of title #2 630c, player is just confirmed " CPS_unit_number ", is read " unit key of CPS unit #1 " 910a then from concordance list.
The decruption key of title #2 630c also is the decruption key as the title #1 630a that is recorded in the title in the dish.Title #2 630c and title #1 630a with identical secret key encryption to share " unit key ".
By staying enciphered data and being used to decipher link information between the key of this enciphered data, available this link information is easily read the key that is used to decipher these data.Therefore, the present invention's data decryption glibly.
Fig. 9 B is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of sixth embodiment of the invention, wherein the link information about data download is present in the concordance list, and is stored in individually in the dish to be used for data download according to the key that this link information is read.
With reference to Fig. 9 B, with Fig. 9 category-A seemingly, the link information between the decruption key of data download and these data is present in the database file.Yet Fig. 9 B and the difference of Fig. 9 A are that data download uses the key different with the key that is recorded in the data in the dish to decipher.
As what mentioned in above description about Fig. 9 A, concordance list is in order to reproduce the new concordance list 630 of downloaded title.Title #1 630a in the title of this new concordance list and title #3 630b are equal to title #1 and the title #2 that is recorded in the dish respectively.And title #2 630c is a downloaded title.
Therefore, in case provided the reproduction order that is recorded in the title in the dish, just can use " CPS_unit_number " to read the key that to decipher this title by the title in the unit key file 920.That is, the title #1 630a of concordance list 630 can confirm that indication title #1 630a is included in the information in " CPS unit #1 " by " CPS_unit_number of title #1 ".In case this information is identified, just can decipher title #1 630a by from the decruption key 921 that is recorded in the interior data of dish, reading " unit key of CPS unit #1 " 921a.
Similarly, via " CPS_unit_number of title #2 ", the title #3 630b of concordance list 630 deciphers by " unit key of CPS unit #2 " in the decruption key 921 that is recorded in the data in the dish.
Except being recorded in the used decruption key of data in the dish, the dish author also can store the spare key that is used for data download with the consideration data download in dish.Content provider is by providing data with data encryption for the secret key decryption that will be used for data download by the independent storage that is stored in the key in the dish.Therefore, the user who holds this key only can reproduce this data download.
" unit key of CPS unit #n " 922a that title #2 630b is encrypted as by being stored in the key 922 that is used for data download in the dish in addition deciphers.The link information of the decruption key of title #2 630c is represented as " CPS_unit_number=N " according to the present invention, and is present in the concordance list 630 as database file.In case provide the reproduction order of title #2 630c, player just confirms in the concordance list 630 that " CPS_unit_number " is " N " and read " unit key of CPS unit #n "." unit key of CPS unit #n " of being read thus be provided for content decryption module deciphering title #e with title #3 630.
Fig. 9 C is the diagrammatic sketch that is used to illustrate according to the method for the use link information data decryption of seventh embodiment of the invention, and wherein link information is configured to the unique file in the local storage.
With Fig. 9 A or Fig. 9 category-B seemingly, Fig. 9 C shows corresponding secret key can be by an embodiment who provides link information to read.Yet the difference of Fig. 9 C and Fig. 9 A or Fig. 9 B is that link information is not to be present in database file but to be present in independently in the file, and use this document playback record in dish title or the corresponding secret key of downloaded title.
With reference to Fig. 9 C, the unit key file 910 of enciphered data is present in the dish and exists makes the reproduced new concordance list 630 of data download energy.
Title #1 630a is the title of encrypting with " unit key of CPS unit #1 " 910a.Title #3 630b is the title of encrypting with " unit key of CPS unit #2 " 910b.And title #2 is downloaded title and uses " unit key of CPS unit #3 " 910b to encrypt.In order to reproduce data, need to decipher these data according to one of " at first play " of concordance list 630, " top menu " and " title ".In order to decipher this data, decipher required correct key and should be read out to offer content decryption module.Link information between the decruption key of enciphered data and these data can be configured to the individual files in the local storage.And this file that disposes separately is named as link information file in the following description.
The link information file 930 that comprises each " CPS_unit_number " in the concordance list 630 is set in the local storage.The title #1 630a of concordance list 630 is corresponding to the title #1 in the link information file, and title #2 630c is corresponding to title #3, and title #3 630b is corresponding to title #2.Especially, " CPS_unit_number " of " CPS_unit_number of title #1 " 930a indication title #1 630a.In " CPS_unit_number of title #2 " 930b indication concordance list title #3 630b " CPS_unit_number ".And " CPS_unit_number " of " CPS_unit_number of title #3 " 930c indication title #2 630c.
In case provide the reproduction order of title #1 630a, just can see title #1 630a " CPS unit " from being configured in the interior link information file of local storage.In Fig. 9 C, the title #1 630a of concordance list " CPS_unit_number " is " 1 ", and the title #2 630c of concordance list " CPS_unit_number " is " 3 ", and the title #3 630b of concordance list " CPS_unit_number " is " 2 ".Therefore, title #1 630a is included in " CPS unit #1 ".In the situation of title #3 630b in concordance list, " unit key of CPS unit #2 " 910b is read out." CPS_unit_number " of title #2 630c is " 3 " and be the data that are included in " CPS unit #3 ".Therefore, " unit key of CPS unit #3 " 910c is read out.Simultaneously, by set up the place of safety in the storage of this locality, link information file 930 can be stored in the place of safety.Perhaps, link information file 930 can be stored in the AV data recorded area that wherein has the AV data.Link information file 930 can be only to dispose a kind of unit key file of " CPS_unit_number ".Yet link information file 930 is different from the unit key file 910 that is stored in the dish, and it does not comprise the actual key that is used for data decryption.
Perhaps, link information file 930 can be provided separately to reproduce data download by content provider, perhaps can dispose by reading data download and being recorded in the link information that coils interior data.
And the data and the data download that are recorded in the dish can be shared " unit key " used in the unit key file.Yet as mentioning in the above description, standby " unit key " is stored for data download and data download can use this standby " unit key " to decipher.
In addition, though be stored in the dish as the exemplary unit key file in 9C at Fig. 9 A, as described in Fig. 8 A and Fig. 8 B, unit key file can be stored in the local storage individually.
The new concordance list 630 of Fig. 6 in the 9C can index file (" index ") form download from the outside or in the storage of this locality, newly dispose.And this new concordance list 630 only need be provided for the user so that data download can be decrypted.
Figure 10 is the process flow diagram according to data decryption method of the present invention.
With reference to Figure 10, in case provide reproduction order (S10) to enciphered data, player is just checked the link information (S20) of these data.In this case, as illustrated in the description of 9C at Fig. 9 A, link information can be present in the database or can be used as link information file and be present in the local storage.
Use the used key (S30) of reading of data deciphering the unit key file of link information in being present in recording medium or local storage.This unit key file can only comprise the decruption key that is recorded in the data in the recording medium or also can comprise the spare key that is used for data download.
In case key is read out (S30), enciphered data just is provided for content decryption module (S40) with this key.In content decryption module, use these data of secret key decryption (S50) that provided.In case data are decrypted, these data just are resumed to the form before encrypting and can reproduce by demoder 17 subsequently.
Figure 11 is used for illustrating that the present invention reproduces the diagrammatic sketch of the situation that data are shared.
With reference to Figure 11, a plurality of titles are present in the dish and one of these titles can completely or partially be shared the montage that is used to dispose another title.Share each other in the situation of a montage at a plurality of titles, the dish author preferably uses identical " unit key " ciphered data configuration title in identical to be included in " CPS unit ".Promptly preferably, the data that belong to different " CPS unit " are not shared each other.Can not difference " unit key " should be used respectively with one " unit key " deciphering owing to dispose the title that is included in the data in the difference " CPS unit " respectively, therefore when reproducing corresponding title, mistake may be caused.And player needs bigger data-handling capacity and the data processing speed of Geng Gao.
Title #3 reproduces by comprising a pair of playlist #3 that plays item.Title #3 by sharing the montage 1110 of reproducing by title #1 a part of 1110a and a part of 1120a of the montage 1120 of reproducing by title #2 dispose.Share a montage for ease of title #3 and title #1, should distribute " unit key " of equal value with title #1 " unit key " to title #3.Therefore, title #1 need encrypt and the direct and shared montage of title #2 with identical " unit key ".Related each other title #1, title #2 and title #3 holds " key #1 " this identical " unit key " by directly or indirectly sharing montage.
In the above description, in title #3 is recorded in and for example coils.Yet same logic is applicable to that also title #3 is the situation of downloading outside coiling.When downloaded title was provided, content provider was preferably used the montage that is included in identical " CPS unit " when configuration comprises the title that is recorded in the montage in the dish.When being used for the montage of downloaded title in attempting the use dish, these montages are encrypted with identical " unit key ".
In the above description, data are recorded in the recording medium, and the BD-ROM that is used to reproduce record data only is used as an example.Yet according to recording medium, data can be written into recording medium and also can read from recording medium.But the method for record with the data of secret key encryption is described as follows with reference to the BD-RE (BD can rewrite) in the write record medium.
At first, in the process that data is write on the BD-RE dish, can reproduce the playlist that will write data and be disposed virtually.The playlist of this virtual configuration is named as virtual playlist.And, editor, record of writing on the data on the dish etc. carried out by this virtual playlist.
Virtual playlist is play (PI) with at least one and is disposed.And this is play and to specify the montage that will be reproduced by virtual playlist.Montage is present in recording medium or the local storage, and is can be by the real data of actual playlist reproduction.Virtual playlist can dispose by making up the data of being reproduced by a plurality of actual playlist whole or in part with being disposed by the data that an actual playlist is reproduced maybe.
In the following description, playlist #1 shown in Figure 11 is named as actual playlist #1, playlist #2 is named as actual playlist #2, and playlist #3 is named as the virtual playlist #3 that can write the data of being reproduced by playlist #1 and #2.
When the configuration virtual playlist, the invention is characterized in that this montage is included in identical " CPS unit " under the encrypted situation of the montage that is used for the configuration virtual playlist.Promptly preferably, the data that need not be included in the difference " CPS unit " are come the configuration virtual playlist.
Virtual playlist #3 can be by the montage 1110 that will reproduce by actual playlist #1 a part of 1120a of a part of 110a and the montage 1120 of reproducing by actual playlist #2 combine and dispose.The montage 1110 of being reproduced by actual playlist #1 has " key #1 " this identical " unit key " with the montage 1120 of being reproduced by actual playlist #2.In the situation of encrypting with identical " unit key ", montage is included in identical " CPS unit ".So montage 1110 and 1120 is the montages that are included in identical " CPS unit ", and virtual playlist #3 can dispose by a part of 1110a of montage and 1120a are combined.In data were recorded in situation on the dish by virtual playlist #3, this was recorded in data on the dish and can uses " key #1 " or decipher corresponding to the key of " key #1 ".
In the situation that is included in respectively by the montage 1110 of actual playlist #1 reproduction with by the montage 1120 that actual playlist #2 reproduces in different " CPS unit ", if i.e. montage 1110 and 1120 uses different " unit key " to encrypt respectively, then the present invention does not dispose virtual playlist.Thus, can prevent from not obtain copy, editor and the record of the content of content provider permission.Therefore, this content can be protected.
Figure 12 is used for illustrating that the present invention disposes the diagrammatic sketch of the situation of title with main path and subpath.
At first, playlist can only comprise main path but also can comprise a main path and at least one or a plurality of subpath.Comprise in the situation of subpath that at playlist the data that are used for disposing main path and subpath are preferably incorporated in identical " CPS unit ".In this case, main path can use identical " unit key " to decipher with subpath.With reference to Figure 12, the data of configuration main path are to be recorded in the data in the dish and the data that dispose subpath are downloaded.The playlist that can reproduce this data download comprises a main path and two subpaths (subpath #2, subpath #3).
Main path comprises to be play a #1 (PI#1) and plays a #2 (PI#2).Play a #1 designated recorder in dish montage #1 1210a and play the montage #2 1210b of a #2 designated recorder in coiling.Among montage #1 and the montage #2 each all is the montage that generates from multiplex video (V), audio frequency (A), Presentation Graphics (PG) and interactive graphics (IG) (IG).
Among subpath #2 and the subpath #3 each comprises a son broadcast (SPI).The son of configuration subpath #2 is play the montage #1 1220a of a designated store in the storage of this locality, and the son of configuration subpath #3 is play the montage #2 1220b of a designated store in the storage of this locality.The montage #11220a and the montage #21220b that are stored in the local storage are the montages of downloading outside coiling.Montage #11220a is that synchronized model audio stream and montage #2 are the stream (PG stream separately) that only is used for Presentation Graphics.
Being recorded in interior montage #1 1210a and the montage #2 1210b in order to the configuration main path of dish is the montage of encrypting with " key of title #2 ".In the situation of reproducing this main path and subpath #2 and/or subpath #3, be stored in respectively in the local storage and can decipher with " key of title #2 " with montage #1 1220a and the montage #2 1120b that disposes subpath #2 and subpath #3.
In the situation of encrypting respectively in order to the montage #1 1220a of configuration subpath #2 and subpath #4 and montage #2 1220b, the montage #1 1210a of the main path that the content provider application configuration will be reproduced with this subpath and the same key of montage #2 1210b are carried out encryption.Receive the user who holds " key of title #2 " in the middle of the user of encryption montage of this download and can reproduce this main path and subpath simultaneously.
The data that Figure 12 shows the configuration subpath are examples of data download.Yet all data of being reproduced by playlist can be the data that are recorded in the dish, and the data that perhaps dispose main path also can be data download.In addition, the part of the data of configuration main path or subpath also can be a data download, and the data in being recorded in dish are reproduced then.
With reference to Fig. 4 data decryption according to the present invention is described as follows with device.Data decryption according to the present invention comprises with device: pick-up 11, be used for the data of reading and recording at recording medium, local storage 15, be used to store the encrypted and data downloaded that is associated with recording medium, and controller 12, be used for using the key in the key file that is stored in one of recording medium or local storage to decipher this data download.
The decruption key of data download can be to be recorded in the decruption key of the data in the recording medium or to be stored in separately in the recording medium to be used to decipher the key of data download.
Be stored in the situation of the secret key decryption data in the local storage in use, this key that is stored in the local storage 15 can read to be stored in the local storage from recording medium.The key of downloading outside recording medium can be included by independent process.
In the situation of the data in deciphering is recorded in recording medium, controller 12 can be read key in the key file from be stored in recording medium.In some cases, be stored in key file in the local storage can be used for being stored in the data in the local storage and be recorded in the recording medium data both.
In the situation in key being stored in local storage 15, the place of safety is based upon in the local storage to prevent the equivalent risk such as the hacker.And, key can be inserted this place of safety.
The data that are downloaded to local storage 15 be be recorded in recording medium in the situation of the subpath data that are associated of main path in, these subpath data preferably use the same key of main path data to decipher.For this reason, the same key that content provider should the main path data of service recorder in recording medium is encrypted the subpath data that offer the user.
And data decryption apparatus according to the present invention comprises: pick-up 11 is used for reading from recording medium the information of this recording medium; Local storage 15 is used to store the encrypted and data downloaded that is associated with recording medium; And controller 12, be used to use the link information between data download and the decruption key to read decruption key and use this decruption key deciphering data download.And Content supply can be inserted link information in the database file of data download so that link information is offered the user.
In addition, link information can be configured to independent file to be stored in the local storage.The information of indicating each data to belong to a CPS unit can be used as link information.In addition, CPS_unit_number can be used as the information of indication CPS unit.
Correspondingly, by the present invention, can prevent to content unauthorized copy, sail again and sell etc.Therefore, content can be provided safely and reproduce data effectively, can provide function more easily to the user thus.
Industrial applicibility
It will be apparent to one skilled in the art that and to carry out in the present invention various modifications and changes and not Can deviate from Spirit Essence of the present invention and scope. Therefore, the present invention is intended to contain these modifications and changes of the present invention, As long as they drop on the range of claims and equivalents thereof.

Claims (31)

1. the method for a data decryption may further comprise the steps:
To be downloaded to local storage with the recording medium associated encrypted data; And
Use is stored in first kind secret key decryption in the key file in the described recording medium and is recorded in data in the described recording medium; And
Use and describedly be stored in the key file in the described recording medium or be stored in the second class secret key decryption institute data downloaded in one of key file in the described local storage.
2. the method for claim 1 is characterized in that, the described second class key is equal to described first kind key.
3. the method for claim 1 is characterized in that, described second class key and described first kind key separate storage.
4. the method for claim 1 is characterized in that, is stored in described key file and the described key file separate storage that is stored in the described recording medium in the described local storage.
5. the method for claim 1 is characterized in that, is stored in the key that described key file in the described local storage comprises download.
6. the method for claim 1 is characterized in that, the described key file that is stored in the described local storage reads from described recording medium to be stored in the described local storage.
7. the method for claim 1 is characterized in that, the described key file that is stored in the described local storage is placed into described local place of safety of storing.
8. the method for claim 1, it is characterized in that, described data downloaded be be recorded in described recording medium in the situation of the subpath data that are associated of main path in, described subpath data use the same key of described main path data to decipher.
9. the method for a data decryption may further comprise the steps:
To be downloaded to local storage with the data of the secret key encryption that is associated with recording medium;
Use the link information between described data and the described decruption key to read decruption key; And
Use described decruption key to decipher described data.
10. method as claimed in claim 9 is characterized in that described link information is included in the database file of institute's data download.
11. method as claimed in claim 9 is characterized in that, described link information is stored in the described local storage as link information file.
12. method as claimed in claim 11 is characterized in that, described link information file is stored in the place of safety in the described local storage.
13. method as claimed in claim 11 is characterized in that, described link information file is stored in the AV data recorded area in the described local storage.
14. method as claimed in claim 9 is characterized in that, described link information is ' CPS_unit_number '.
15. method as claimed in claim 14 is characterized in that, described decruption key defines with reference to described ' CPS_unit_number '.
16. method as claimed in claim 14 is characterized in that, described ' CPS_unit_number ' distributes by title.
17. a recording medium comprises:
Wherein write down substantial stream district; And
Be used to manage the database community of described reproduction of content,
Wherein, be included in the described stream district with a plurality of titles of secret key encryption, and
A plurality of in described title completely or partially share in the situation of a montage each other, share the described title of described montage and encrypt with identical key.
18. recording medium as claimed in claim 17 is characterized in that, comprises in the situation of main path and subpath at the described title with secret key encryption, each in described main path and the described subpath is with identical secret key encryption.
19. recording medium as claimed in claim 17, it is characterized in that, if the title of downloading is completely or partially shared the interior montage in order to the configuration encrypted title of described recording medium, the described title of then sharing the montage in the described recording medium uses identical key to encrypt.
20. a device that is used for data decryption comprises:
Pick-up is used for the data of reading and recording at recording medium;
Local storage is used to store that downloaded and described recording medium associated encrypted data; And
Controller, be used for using the first kind secret key decryption in the key file that is stored in described recording medium to be stored in described data in the described recording medium, described controller uses and is stored in the described key file in the described recording medium or is stored in the second class secret key decryption institute data downloaded in one of key file in the described local storage.
21. device as claimed in claim 20 is characterized in that, the described second class key is equal to described first kind key.
22. device as claimed in claim 20 is characterized in that, described second class key and described first kind key separate storage.
23. device as claimed in claim 20 is characterized in that, is stored in described key file and the described key file separate storage that is stored in the described recording medium in the described local storage.
24. device as claimed in claim 20 is characterized in that, is stored in described key file in the described local storage and is placed into place of safety in the described local storage.
25. device as claimed in claim 20, it is characterized in that, described data downloaded be be recorded in described recording medium in the situation of the subpath data that are associated of main path in, described controller uses the same key of described main path data to decipher described subpath data.
26. a device that is used for data decryption comprises:
Pick-up is used for from the data of recording medium reading and recording at described recording medium;
Local storage is used to store download and described recording medium associated encrypted data; And
Controller is used to use the link information between institute's data downloaded and the described decruption key to read decruption key, and described controller uses described decruption key to decipher institute's data downloaded.
27. device as claimed in claim 26 is characterized in that, described link information is included in the database file of institute's data download.
28. device as claimed in claim 26 is characterized in that, described link information is stored in the described local storage as link information file.
29. device as claimed in claim 28 is characterized in that, described link information file is stored in the place of safety in the described local storage.
30. device as claimed in claim 28 is characterized in that, described link information file is stored in the AV data recorded area in the described local storage.
31. device as claimed in claim 26 is characterized in that, described link information is CPS_unit_number.
CN2006800023736A 2005-01-19 2006-01-04 Apparatus for decrypting data and method thereof Expired - Fee Related CN101103406B (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US64458805P 2005-01-19 2005-01-19
US60/644,588 2005-01-19
KR1020050109694 2005-11-16
KR10-2005-0109694 2005-11-16
KR1020050109694A KR101147763B1 (en) 2005-01-19 2005-11-16 Data decryption method and apparatus, recoding medium comprising encrypted data
PCT/KR2006/000031 WO2006078100A2 (en) 2005-01-19 2006-01-04 Recording medium, apparatus for decrypting data and method thereof

Publications (2)

Publication Number Publication Date
CN101103406A true CN101103406A (en) 2008-01-09
CN101103406B CN101103406B (en) 2012-10-31

Family

ID=37174444

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2006800024565A Expired - Fee Related CN101107656B (en) 2005-01-19 2006-01-04 Apparatus for reproducing data from recording medium using local storage and method thereof
CN2006800023736A Expired - Fee Related CN101103406B (en) 2005-01-19 2006-01-04 Apparatus for decrypting data and method thereof

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN2006800024565A Expired - Fee Related CN101107656B (en) 2005-01-19 2006-01-04 Apparatus for reproducing data from recording medium using local storage and method thereof

Country Status (6)

Country Link
US (2) US8233777B2 (en)
JP (2) JP4823235B2 (en)
KR (2) KR101147763B1 (en)
CN (2) CN101107656B (en)
BR (2) BRPI0606604A2 (en)
RU (2) RU2398293C2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675895A (en) * 2015-03-30 2020-01-10 松下电器(美国)知识产权公司 Reproducing method, reproducing apparatus, and recording medium

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3837427B2 (en) * 2002-09-12 2006-10-25 松下電器産業株式会社 Recording medium, reproducing apparatus, program, reproducing method, recording method
AU2003268656A1 (en) * 2002-09-25 2004-04-19 Matsushita Electric Industrial Co., Ltd. Reproduction device, optical disc, recording medium, program, and reproduction method
EP1785902B1 (en) * 2005-10-28 2010-05-05 Emma Mixed Signal C.V. Decryption key table access control on ASIC or ASSP
JP4491035B2 (en) * 2006-03-24 2010-06-30 パナソニック株式会社 Playback device, debug device, system LSI, program
US8150097B2 (en) * 2007-01-24 2012-04-03 Sony Corporation Concealed metadata transmission system
US7945052B2 (en) * 2007-03-29 2011-05-17 Gary Stephen Shuster Method of distributing a decryption key in fixed-content data
US20080301465A1 (en) * 2007-06-04 2008-12-04 Microsoft Corporation Protection of software transmitted over an unprotected interface
JP4683092B2 (en) * 2008-08-18 2011-05-11 ソニー株式会社 Information processing apparatus, data processing method, and program
WO2010048531A1 (en) 2008-10-24 2010-04-29 Datcard Systems, Inc. System and methods for metadata management in content addressable storage
KR101245519B1 (en) * 2008-12-09 2013-03-20 한국전자통신연구원 Apparatus and method for protecting broadcasting contents
US8972843B2 (en) * 2009-07-29 2015-03-03 Hewlett-Packard Development Company, L.P. Sending a subset of component documents of a modular document to an electronic device
WO2011133917A2 (en) * 2010-04-23 2011-10-27 Datcard Systems, Inc. Event notification in interconnected content-addressable storage systems
US20120185759A1 (en) * 2011-01-13 2012-07-19 Helen Balinsky System and method for collaboratively editing a composite document
US20150135071A1 (en) * 2013-11-12 2015-05-14 Fox Digital Entertainment, Inc. Method and apparatus for distribution and presentation of audio visual data enhancements
US10741221B2 (en) * 2017-07-12 2020-08-11 Disney Enterprises, Inc. Menu navigation mode for media discs

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100415872B1 (en) 1994-10-10 2004-04-30 코닌클리케 필립스 일렉트로닉스 엔.브이. Database System and Database Super System
GB9916212D0 (en) * 1999-07-09 1999-09-15 Simmons Douglas M A system and method for distributing electronic publications
CA2299946A1 (en) * 2000-03-03 2001-09-03 Destiny Software Productions Inc. Digital media distribution method and system
US20020159592A1 (en) * 2000-05-11 2002-10-31 Hideki Matsushima Content reception terminal and recording medium
WO2002047080A2 (en) 2000-12-07 2002-06-13 Sandisk Corporation System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
US20020076204A1 (en) * 2000-12-18 2002-06-20 Toshihisa Nakano Key management device/method/program, recording medium, reproducing device/method, recording device, and computer-readable, second recording medium storing the key management program for copyright protection
JP3946965B2 (en) * 2001-04-09 2007-07-18 ソニー株式会社 Recording apparatus, recording method, recording medium, and program for recording information protecting intangible property rights
WO2002093825A1 (en) * 2001-05-15 2002-11-21 Mitsubishi Denki Kabushiki Kaisha Content reproduction apparatus, content distribution server, and content distribution system
JP2002374244A (en) 2001-06-13 2002-12-26 Kenwood Corp Information distribution method
JP3656248B2 (en) * 2001-10-09 2005-06-08 ソニー株式会社 Video signal recording apparatus and method, video signal reproducing apparatus and method, recording medium, program, and data structure
KR20040045821A (en) * 2001-10-12 2004-06-02 코닌클리케 필립스 일렉트로닉스 엔.브이. Secure content distribution method and system
WO2003044712A1 (en) 2001-10-18 2003-05-30 360 Degree Web, Inc. Smart card enabled secure computing environment system
US20030158532A1 (en) 2002-02-20 2003-08-21 Magee Luke R. Disposable absorbent article designed to facilitate an easy intuitive change
JP4192499B2 (en) * 2002-05-23 2008-12-10 ソニー株式会社 Information processing apparatus, information processing method, content input / output processing system, content input / output processing method, and computer program
JP2004087063A (en) * 2002-07-02 2004-03-18 Sony Corp Data recording medium, medium information recording method, medium information recording device, medium information reproducing method, medium information reproducing device, information service method, and information service system
AU2003268656A1 (en) 2002-09-25 2004-04-19 Matsushita Electric Industrial Co., Ltd. Reproduction device, optical disc, recording medium, program, and reproduction method
TWI260591B (en) 2002-10-14 2006-08-21 Samsung Electronics Co Ltd Information storage medium with structure for multi-angle data, and recording and reproducing apparatus therefor
US7353543B2 (en) 2003-01-10 2008-04-01 Matsushita Electric Industrial Co., Ltd. Contents distribution system
WO2004114303A1 (en) * 2003-06-18 2004-12-29 Matsushita Electric Industrial Co., Ltd. Playback apparatus, playback method, and program for reproducing an encrypted virtual package
JP4602702B2 (en) * 2003-06-18 2010-12-22 パナソニック株式会社 Content reproduction apparatus, content reproduction method, and program
JP3931869B2 (en) * 2003-08-14 2007-06-20 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
KR100934305B1 (en) * 2003-10-03 2009-12-29 샤프 가부시키가이샤 Recording and reproducing apparatus, av data managing method, and server
EP1524659A1 (en) 2003-10-13 2005-04-20 Deutsche Thomson-Brandt Gmbh Method and apparatus for decrypting an encrypted supplementary data set
JP4649865B2 (en) 2003-11-06 2011-03-16 ソニー株式会社 Information processing apparatus, information recording medium, information processing method, and computer program
JP3888348B2 (en) 2003-11-25 2007-02-28 ソニー株式会社 Information providing system, reproducing apparatus and method, information providing apparatus and method, recording medium, and program
KR20050054034A (en) 2003-12-03 2005-06-10 엘지전자 주식회사 Method for managing and reproducing a file of high density optical disc
US7765158B2 (en) 2004-01-27 2010-07-27 Panasonic Corporation Playback apparatus and server apparatus
CN1914850B (en) * 2004-01-29 2010-07-21 索尼株式会社 Information processing device and method
US7528473B2 (en) 2004-03-19 2009-05-05 Renesas Technology Corp. Electronic circuit, a semiconductor device and a mounting substrate
US20060014521A1 (en) 2004-07-14 2006-01-19 Zhi-Wen Chen Data protection method and system using the same
EP2270805A3 (en) 2004-07-22 2011-01-26 Panasonic Corporation Playback apparatus for performing application-synchronized playback
EP2216783A1 (en) * 2004-07-22 2010-08-11 Panasonic Corporation Playback apparatus and playback method
US20060031873A1 (en) * 2004-08-09 2006-02-09 Comcast Cable Holdings, Llc System and method for reduced hierarchy key management
US7613384B2 (en) * 2004-08-17 2009-11-03 Lg Electronics Inc. Method for configuring composite file structure for data reproduction, and method and apparatus for reproducing data using the composite file structure

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675895A (en) * 2015-03-30 2020-01-10 松下电器(美国)知识产权公司 Reproducing method, reproducing apparatus, and recording medium
CN110675895B (en) * 2015-03-30 2021-06-15 松下电器(美国)知识产权公司 Reproducing method, reproducing apparatus, and recording medium

Also Published As

Publication number Publication date
JP2008535126A (en) 2008-08-28
RU2398293C2 (en) 2010-08-27
US20060159426A1 (en) 2006-07-20
JP4823235B2 (en) 2011-11-24
JP2008532194A (en) 2008-08-14
KR20060084350A (en) 2006-07-24
CN101107656B (en) 2011-04-27
US20070067646A1 (en) 2007-03-22
US7958375B2 (en) 2011-06-07
RU2404463C2 (en) 2010-11-20
KR20060084351A (en) 2006-07-24
KR101147763B1 (en) 2012-05-25
US8233777B2 (en) 2012-07-31
CN101107656A (en) 2008-01-16
BRPI0606605A2 (en) 2009-07-07
RU2007131426A (en) 2009-02-27
CN101103406B (en) 2012-10-31
KR101216070B1 (en) 2012-12-26
BRPI0606604A2 (en) 2010-03-09
RU2007131440A (en) 2009-02-27

Similar Documents

Publication Publication Date Title
CN101103406B (en) Apparatus for decrypting data and method thereof
US7664262B2 (en) Playback apparatus and playback control method
US8073143B2 (en) Information processing device and method
CN1848279B (en) Information processing device and method
US8583660B2 (en) Information processing apparatus, information processing method, and computer program
JP4396737B2 (en) Information processing apparatus, content providing system, information processing method, and computer program
CN101099211A (en) Protection method for shared content, method and apparatus for reproducing a data recorded in recording medium using a local storage
JP2008524692A (en) How to unlock protected portable storage media
CN1870160B (en) Data reproducing method, data recording/reproducing device, and data transfer method
CN101356576B (en) Recording medium, apparatus for reproducing data and method thereof
CN1866379B (en) Recording medium, and method and apparatus for reproducing data from the recording medium
JP4515506B2 (en) Information recording medium, data structure, and data reproducing method
EP1842192A2 (en) Data transmitting method, recording medium, apparatus for reproducing data from recording medium using local storage and method thereof
JP4783159B2 (en) Content storage device, content playback device, content storage program, and content playback program
WO2006078100A2 (en) Recording medium, apparatus for decrypting data and method thereof
JP6489533B2 (en) Information processing method and information processing terminal
JP2005108198A (en) Content recording device, content recording method, and hard disc device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121031

Termination date: 20170104